Salesforce B2C Commerce Cloud provides many security features out of the box. And because it is a SaaS solution, the security of the servers is handled by the technical teams at Salesforce.
That doesn’t mean that you can just lay back and do your thing without worrying about security. So let’s look at what you need to keep in mind when developing for B2C Commerce Cloud.
Account Manager Security
One of the most significant changes in Salesforce B2C Commerce Cloud is removing “local users” from the environments. Access to sandboxes and PIG (Primary Instance Group) instances passes through Account Manager and its security features.
This has brought up many discussions about sharing accounts over the past year (more on the core platform than on SFCC).
You might think it strange that the first topic is securing your account. But if someone has access, they can upload malicious code or download sensitive data with little effort.
Single account to rule them all
The main advantage (from my perspective) is that you now have one account to log in to many different environments (and across realms).
But this comes at a price.
If an account becomes compromised, especially Account Managers, someone can get access to many different environments in one swing.
2FA has been made mandatory to mitigate this threat and has been the recommendation for more than a year.
2FA (Two-Factor-Authentication)
With Account Manager, it is possible to add 2FA to your account to secure it. Even if someone manages to figure out your account password, they still need to be able to provide the secondary authentication method.
For many people having to put Salesforce Authenticator into the log-in procedure was not the best experience (but it has improved a lot in the last months).
There are different options possible with Account Manager:
- Salesforce Authenticator (Application)
- Security Key (Physical Device)
- TOTP (Time-based one-time password) application
- Salesforce Identity (Documentation)
I decided to make it a tad more manageable to log in by creating “Automaton.” A browser (chromium) plugin that acts as a TOTP mobile application. As a bonus, it also automatically fills in all fields.
It is, of course, secured by a “Vault Password,” so not everyone that has access to your laptop can log in.
It may seem like an inconvenience that costs you time over the day. But think of what could happen if someone takes over your account and can access all of the Salesforce B2C Commerce Cloud environments linked to your account.
Shared Accounts
Sharing accounts is something that Salesforce does not advise (for a good reason), but there are still use-cases where this necessary evil is needed.
Some use-cases where this might be necessary:
- An integration user
- … no, that is about it for SFCC
You do not have to log in to the business manager as an integration user in most cases. But if it happens, usually more than one person needs to be able to do this (leave, sickness, … )
So think of secure ways to share your 2FA (usually TOTP for shared accounts). A good solution I found so far is 1password which supports TOTP.
Cloudflare
You might think that all of the provided services of Salesforce will keep you safe from bad actors. While it does block a lot of traffic that does not have the best intentions, it can’t stop everything and everyone that means to do harm.
You can find more information about what the eCDN (Cloudflare) can do in the Infocenter.
Security Best Practices
Lucky for me (and you), Salesforce has already written quite a few guidelines on Security Best Practices for Developers.
On the Salesforce Commerce Cloud Infocenter, there is a lot of information already documented about different types of attacks and how to mitigate them:
- Encryption and Cryptography
- Cross-Site Scripting
- Declarative Security via HTTP Headers
- Commerce Script Injection
- Cross-Site Request Forgery
- Secret Storage
- Using Hooks Securely
- Data Validation
- Open Redirect Attacks
- Authentication and Authorization
- Supply Chain Security
- Secure Logging
- General Secure Coding Practices
- AppExchange Security Reviews
Quite the list, isn’t it! Even though Salesforce takes care of quite a few things, you still need to keep yourself in check. Follow the provided guidelines not to compromise the channels you implement on Salesforce B2C Commerce Cloud.
Security Headers in SFRA
To increase the channel’s security, Salesforce allows developers to set specific headers in the responses to tell browsers and applications what is permitted and what is not.
A config file was introduced into the SFRA to easily set headers for all responses, rather than having to do it for each endpoint separately.
[
{
"id": "Content-Security-Policy",
"value": "frame-ancestors 'self'"
},
{
"id": "X-Content-Type-Options",
"value": "nosniff"
}
]
The standard file (httpHeadersConf.json) only sets two security headers, but it is possible to develop more.
It is important to note that Salesforce limits the headers you can set to a list of constants in the Response class.
I have compiled a list and their descriptions below to make things easier.
The Access-Control-Allow-Credentials response header tells browsers whether to expose the response to the frontend JavaScript code when the request’s credentials mode (Request.credentials) is include.
When a request’s credentials mode (Request.credentials) is include, browsers will only expose the response to the frontend JavaScript code if the Access-Control-Allow-Credentials value is true.
The Access-Control-Allow-Headers response header is used in response to a preflight request which includes the Access-Control-Request-Headers to indicate which HTTP headers can be used during the actual request.
The Access-Control-Allow-Methods response header specifies one or more methods allowed when accessing a resource in response to a preflight request.
The Access-Control-Allow-Origin response header indicates whether the response can be shared with requesting code from the given origin.
The Access-Control-Expose-Headers response header allows a server to indicate which response headers should be made available to scripts running in the browser, in response to a cross-origin request.
The HTTP Content-Security-Policy response header allows web site administrators to control resources the user agent is allowed to load for a given page. With a few exceptions, policies mostly involve specifying server origins and script endpoints. This helps guard against cross-site scripting attacks (Cross-site_scripting).
Note: The Commerce Cloud platform can override this header for tools like the Storefront Toolkit.
The HTTP Content-Security-Policy-Report-Only response header allows web developers to experiment with policies by monitoring (but not enforcing) their effects. These violation reports consist of JSON documents sent via an HTTP POST request to the specified URI.
Note: You can set this response header only for storefront requests. Report recipient can’t be a B2C Commerce system.
The HTTP Cross-Origin-Embedder-Policy (COEP) response header prevents a document from loading any cross-origin resources that don’t explicitly grant the document permission (using CORP or CORS).
The HTTP Cross-Origin-Opener-Policy (COOP) response header allows you to ensure a top-level document does not share a browsing context group with cross-origin documents.
The HTTP Cross-Origin-Resource-Policy response header conveys a desire that the browser blocks no-cors cross-origin/cross-site requests to the given resource.
Permissions-Policy
Permissions Policy Header is an added layer of security that helps to restrict from unauthorized access or usage of browser/client features by web resources. This policy ensures the user privacy by limiting or specifying the features of the browsers can be used by the web resources.
The Referrer-Policy HTTP header controls how much referrer information (sent with the Referer header) should be included with requests. Aside from the HTTP header, you can set this policy in HTML.
The X-Content-Type-Options response HTTP header is a marker used by the server to indicate that the MIME types advertised in the Content-Type headers should be followed and not be changed. The header allows you to avoid MIME type sniffing by saying that the MIME types are deliberately configured.
TThe X-Frame-Options HTTP response header can be used to indicate whether or not a browser should be allowed to render a page in a , <iframe>, <embed /> or <object>. Sites can use this to avoid click-jacking attacks, by ensuring that their content is not embedded into other sites.
Note: The Commerce Cloud platform can override this header for tools like the Storefront Toolkit.
Note: The values of this header are restricted to: “ALLOW-FROM”, “DENY”, “SAMEORIGIN”.
PWA Kit
As the PWA Kit is “relatively” new, there is no real documentation on PWA-specific security best practices. But the amount of information being added to the Developer Portal is constantly growing.
Malicious Modules
One of the gripes developers have had is that the Rhino Engine does take too kindly to NPM packages. Finding compatible packages is a challenge, and in many cases, they need to be converted to work correctly.
With the PWA Kit, all of that changes; you get a lot more freedom with the third-party packages you can install. But with that freedom comes a lot of responsibility. Granted, this is already something you need to keep in mind with SiteGenesis and SFRA, as the storefront JavaScript does not have the Rhino limitations. You have undoubtedly already installed a few packages to expand the capabilities in the storefront.
You shouldn’t forget that npm is an open ecosystem where anyone can contribute to a module or repository. And in return, anyone can use a simple command to download that code into their project.
But what if the person behind that repository does not have the best intentions? They could put malicious code into it. Or maybe the repository itself does not contain the malicious code; it could be in a dependency that they have on another package!
I can go on about this topic, but the following blog post by Liran Tal tells the whole story:
npm-audit
As SFRA and PWA Kit use npm for their third-party libraries, it makes sense to use the out-of-the-box feature of npm to do a security audit of all of your packages.
The audit command submits a description of the dependencies configured in your project to your default registry and asks for a report of known vulnerabilities.
Note: Always test thoroughly after updating your packages (with or without using the npm audit function) to ensure all functionalities work as expected!